This document provides an overview of routing concepts including:
- Routers use information in packets and routing tables to determine the best path and forward packets towards their destination.
- Static and dynamic routing allow routers to build routing tables with routes to directly connected, remote, and default networks.
- Basic router configuration settings and verification commands are demonstrated on a sample topology.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
The document summarizes the OSI network layer and TCP/IP model Internet layer. It describes how layer 3, the network layer, is responsible for routing packets from source to destination by adding addressing and routing. It focuses on IP version 4, the most common network layer protocol, explaining its packet header fields and how routers use IP addresses and routing tables to forward packets between networks. It also discusses techniques for dividing networks, such as hierarchical addressing and static versus dynamic routing protocols.
CCNA R&S-20-Configuring IPv4 Addresses and RoutesAmir Jafari
This document discusses configuring IPv4 addresses and routes on routers. It covers:
- Connected routes are automatically added for subnets connected to router interfaces when the interface has an IP address configured.
- Routers can route between VLAN subnets using subinterfaces on a physical interface connected via an 802.1Q trunk. Each subinterface represents a VLAN and requires an IP address for the associated subnet.
- Configuring IP addresses on subinterfaces and enabling 802.1Q trunking with the correct VLAN ID allows a router to route between VLAN subnets using only one physical interface.
This document provides an overview of routing fundamentals and subnets. It defines key concepts like routed protocols, routing protocols, IP addressing, and subnetting. Routed protocols like IP define packet formats and addressing to enable communication across networks, while routing protocols like RIP exchange information to maintain routing tables and select optimal paths. The document also explains how routers use routing tables to determine the best path for sending packets and contains examples of subnetting IP addresses to create multiple subnets within a class C network.
This chapter covers IP routing concepts including routing protocols, path selection, static routing, and virtual routing and forwarding. It discusses how different routing protocols advertise and learn routes, the metrics and algorithms routers use to select the best path, and an overview of static and dynamic routing configurations.
This document discusses the network layer and IP routing. It begins with an overview of the network layer and its key functions, including addressing devices, encapsulation, routing, and de-encapsulation. It then covers IPv4 and IPv6 packet headers and characteristics, such as IPv4 addressing limitations that IPv6 addresses. The document discusses routing methods on hosts, including how they determine if a destination is local or remote and use a default gateway. It concludes with an introduction to routing, explaining the different types of routes in a router's table, including direct connections, static routes, and dynamic routes learned from routing protocols.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
The document summarizes the OSI network layer and TCP/IP model Internet layer. It describes how layer 3, the network layer, is responsible for routing packets from source to destination by adding addressing and routing. It focuses on IP version 4, the most common network layer protocol, explaining its packet header fields and how routers use IP addresses and routing tables to forward packets between networks. It also discusses techniques for dividing networks, such as hierarchical addressing and static versus dynamic routing protocols.
CCNA R&S-20-Configuring IPv4 Addresses and RoutesAmir Jafari
This document discusses configuring IPv4 addresses and routes on routers. It covers:
- Connected routes are automatically added for subnets connected to router interfaces when the interface has an IP address configured.
- Routers can route between VLAN subnets using subinterfaces on a physical interface connected via an 802.1Q trunk. Each subinterface represents a VLAN and requires an IP address for the associated subnet.
- Configuring IP addresses on subinterfaces and enabling 802.1Q trunking with the correct VLAN ID allows a router to route between VLAN subnets using only one physical interface.
This document provides an overview of routing fundamentals and subnets. It defines key concepts like routed protocols, routing protocols, IP addressing, and subnetting. Routed protocols like IP define packet formats and addressing to enable communication across networks, while routing protocols like RIP exchange information to maintain routing tables and select optimal paths. The document also explains how routers use routing tables to determine the best path for sending packets and contains examples of subnetting IP addresses to create multiple subnets within a class C network.
This chapter covers IP routing concepts including routing protocols, path selection, static routing, and virtual routing and forwarding. It discusses how different routing protocols advertise and learn routes, the metrics and algorithms routers use to select the best path, and an overview of static and dynamic routing configurations.
This document discusses the network layer and IP routing. It begins with an overview of the network layer and its key functions, including addressing devices, encapsulation, routing, and de-encapsulation. It then covers IPv4 and IPv6 packet headers and characteristics, such as IPv4 addressing limitations that IPv6 addresses. The document discusses routing methods on hosts, including how they determine if a destination is local or remote and use a default gateway. It concludes with an introduction to routing, explaining the different types of routes in a router's table, including direct connections, static routes, and dynamic routes learned from routing protocols.
The document discusses topics related to the network layer, including:
1. It describes virtual circuits and datagrams, which are two methods for transferring data across networks.
2. It covers IPv4 addressing concepts such as address space, notations, classful and classless addressing, subnetting, and network address translation.
3. It provides an overview of additional network layer topics like IPv6 addressing, routing algorithms, internet control protocols, and routing protocols.
This document summarizes the routing table lookup process used by routers to determine the best route to forward IP packets. It begins by explaining the basic steps of the process, including finding a matching network route, determining if it is an ultimate or parent route, and checking for more specific subnet routes. It then provides examples to illustrate what constitutes a match between the destination IP address and routes in the routing table. The key points are that the subnet mask specifies the minimum number of bits that must match, and the route with the longest bit match is selected. The document uses a sample network configuration to demonstrate how the process works in practice when evaluating parent and child routes.
The document discusses troubleshooting static and default routes. It describes how routers process packets using static routes, examining the routing table to determine the next hop. Common troubleshooting steps are explained, such as using ping, traceroute, and show commands to verify routes and isolate issues. The document provides an example of troubleshooting a connectivity problem between routers by examining the routing table and correcting an incorrect static route.
The document discusses troubleshooting static and default routes. It describes how routers process packets using static routes, examining the routing table to determine the next hop. Common troubleshooting steps are explained, such as using ping, traceroute, and show commands to verify routes and isolate issues. The document provides an example of troubleshooting a connectivity problem between routers by examining the routing table and correcting an incorrect static route.
The document provides instructional materials for a chapter on the network layer. It covers topics like network layer protocols including IPv4 and IPv6, routing, routers, and configuring Cisco routers. Sections explain how network layer protocols support communication across networks and the purpose of fields in IPv4 and IPv6 packets. It also details how hosts, routers, and their routing tables determine the path for packets to travel to reach their destination on either the local network or remote networks.
This document provides the questions and answers for CCNA 1 Chapter 6 exam. It tests knowledge of router configuration commands, IPv4 and IPv6 addressing, routing tables, router interfaces, and memory. Some key points covered are that the copy running-config startup-config command saves the router configuration, the differentiated services field defines packet priority, and NAT is not needed in IPv6 because of the huge number of available addresses.
This chapter focuses on IP routing, which is the process of moving packets between networks using routers. It discusses the key components of a routing table that allow routers to determine the best path for packets. It also explains the step-by-step IP routing process that occurs when a host on one network attempts to communicate with a host on another network, including how the routing table is used to determine the appropriate interface to forward the packet out of. The chapter aims to provide readers with a firm understanding of the fundamentals of IP routing.
This chapter covers IP routing and routing basics. It discusses the components of a routing table and how a router makes forwarding decisions. It also explains static and dynamic routing configuration. The document then details the IP routing process, describing how a packet travels from one host to another on different networks, including the roles of ARP, switching, routing tables, and protocols like ICMP and IP. It uses diagrams and examples to illustrate routing concepts.
This document provides an overview of routing technologies and IP routing. It begins by defining the objectives of covering IP routing, routing versus routed protocols, static versus dynamic routing, advantages and disadvantages of each, interfaces versus lines, and setting up a simple network. It then introduces IP routing as the process of moving packets between networks using routers and their routing tables. The document explains static and dynamic routing methods, routing and routed protocols, and provides examples of configuring a basic network with two routers and PCs using Cisco Packet Tracer's command line interface.
This document provides an overview of dynamic routing protocols and configuration of RIPv2. It discusses the purpose of dynamic routing protocols in discovering remote networks, maintaining up-to-date routing information, and choosing the best path. RIPv2 configuration topics include enabling RIP, advertising networks, verifying RIP operation, and propagating a default route. The document also examines the components of routing table entries, such as route source, metric, and next hop. It describes the hierarchy of dynamically learned routes including ultimate, level 1, parent and child routes.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
The document discusses the OSI network layer and IP networking concepts. It covers the basic functions of the network layer including addressing, encapsulation, routing, and decapsulation to enable communication between hosts. The key network layer protocol, IP, is examined in detail including its connectionless and best-effort design. The document also discusses how networks are logically separated to group hosts for improved performance, security, and address management.
The document discusses the functions of the transport layer in the OSI model. It explains that the transport layer accepts data from the session layer, breaks it into packets and delivers them to the network layer. It is responsible for guaranteeing successful arrival of data at the destination and provides end-to-end communication between source and destination transport layers. The transport layer separates upper layers from low-level data transmission details and handles any data loss or damage. It can transmit packets in the same order or as isolated messages depending on the network and protocol.
This document describes a custom network protocol designed to improve throughput performance compared to traditional TCP/IP protocols. The custom protocol uses a simplified 8-byte header containing only essential fields like source/destination addresses and port numbers, and sequence number. Tests of the custom protocol transferring a 10MB file between nodes achieved throughputs up to 902kbps, significantly higher than when using smaller packet sizes. By removing unnecessary TCP/IP header fields and processing, the custom protocol reduces overhead and improves throughput.
Exterior Routing Protocols And Multi casting Chapter 16daniel ayalew
This document discusses exterior routing protocols and multicasting. It begins by explaining the limitations of distance-vector and link-state routing protocols for exterior routing between autonomous systems. It then describes path vector routing and the Border Gateway Protocol (BGP) which allows routers in different autonomous systems to exchange routing information. The document provides details on BGP neighbor acquisition, reachability, and network reachability procedures. It also discusses multicast addressing, protocols like IGMP for host group management, and multicast routing protocols like PIM that establish distribution trees independent of unicast routing.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
IRJET- Constructing Inter Domain Packet Filter for Controlling IP SpoofingIRJET Journal
This document proposes an Inter Domain Packet Filter (IDPF) architecture to reduce IP spoofing on the internet. The IDPF architecture takes advantage of the limited number of feasible paths between autonomous systems (ASes) implied by their commercial relationships. It constructs packet filters based on routing information exchanged in Border Gateway Protocol (BGP) updates between neighboring ASes, without requiring global routing knowledge. Simulation studies show that even partial deployment of IDPFs can help localize the source of attack packets and limit attackers' ability to spoof IP addresses.
This chapter covers Spanning Tree Protocol (STP) fundamentals, including how STP elects a root bridge, identifies root, designated and blocking ports, and prevents forwarding loops. It also examines STP port states and types, as well as how STP converges when links fail through the use of topology change notifications.
Routing of netwok protocls and how .pptxsayidkhalif
This document provides an overview of routing and routers. It discusses what a router is and its main functions, including joining multiple networks, assigning IP addresses, and selecting the best path. The document describes how routers work by examining packet headers to make routing decisions using routing tables. It also covers the various ports found on routers and the different types of memory.
The network layer is responsible for carrying packets between hosts and routing packets through routers and switches. It addresses each device with an IP address to allow global communication. Routing protocols like RIP, OSPF, and BGP are used for routing packets within and between autonomous systems. Multicast routing protocols deliver data from one source to multiple destinations, while flooding can be used for broadcast routing but wastes bandwidth. The network layer packetizes data, fragments packets if needed for transmission through different networks, and performs address resolution.
The document discusses wireless local area networks (WLANs) and their components and operation. It covers topics such as 802.11 wireless standards, WLAN infrastructure components including access points and antennas, WLAN topology modes including infrastructure and ad hoc, the basic service set (BSS) and extended service set (ESS), WLAN frame structure, and CSMA/CA wireless medium access. It also describes CAPWAP protocol which enables a wireless LAN controller to manage multiple access points, the split MAC architecture, and FlexConnect access points which can operate in standalone mode over a WAN link. Finally, it discusses channel management techniques for WLANs such as using non-overlapping channels to avoid interference between access points.
This document provides release notes for firmware version 1.3.4 of the DrayTek VigorAP 902 access point for the UK/Ireland market. The update includes improvements to resolve some security vulnerabilities and fix issues with changing SSIDs and logout functionality. No new features were added in this release. Users are recommended to upgrade to benefit from these improvements and fixes.
This document summarizes the routing table lookup process used by routers to determine the best route to forward IP packets. It begins by explaining the basic steps of the process, including finding a matching network route, determining if it is an ultimate or parent route, and checking for more specific subnet routes. It then provides examples to illustrate what constitutes a match between the destination IP address and routes in the routing table. The key points are that the subnet mask specifies the minimum number of bits that must match, and the route with the longest bit match is selected. The document uses a sample network configuration to demonstrate how the process works in practice when evaluating parent and child routes.
The document discusses troubleshooting static and default routes. It describes how routers process packets using static routes, examining the routing table to determine the next hop. Common troubleshooting steps are explained, such as using ping, traceroute, and show commands to verify routes and isolate issues. The document provides an example of troubleshooting a connectivity problem between routers by examining the routing table and correcting an incorrect static route.
The document discusses troubleshooting static and default routes. It describes how routers process packets using static routes, examining the routing table to determine the next hop. Common troubleshooting steps are explained, such as using ping, traceroute, and show commands to verify routes and isolate issues. The document provides an example of troubleshooting a connectivity problem between routers by examining the routing table and correcting an incorrect static route.
The document provides instructional materials for a chapter on the network layer. It covers topics like network layer protocols including IPv4 and IPv6, routing, routers, and configuring Cisco routers. Sections explain how network layer protocols support communication across networks and the purpose of fields in IPv4 and IPv6 packets. It also details how hosts, routers, and their routing tables determine the path for packets to travel to reach their destination on either the local network or remote networks.
This document provides the questions and answers for CCNA 1 Chapter 6 exam. It tests knowledge of router configuration commands, IPv4 and IPv6 addressing, routing tables, router interfaces, and memory. Some key points covered are that the copy running-config startup-config command saves the router configuration, the differentiated services field defines packet priority, and NAT is not needed in IPv6 because of the huge number of available addresses.
This chapter focuses on IP routing, which is the process of moving packets between networks using routers. It discusses the key components of a routing table that allow routers to determine the best path for packets. It also explains the step-by-step IP routing process that occurs when a host on one network attempts to communicate with a host on another network, including how the routing table is used to determine the appropriate interface to forward the packet out of. The chapter aims to provide readers with a firm understanding of the fundamentals of IP routing.
This chapter covers IP routing and routing basics. It discusses the components of a routing table and how a router makes forwarding decisions. It also explains static and dynamic routing configuration. The document then details the IP routing process, describing how a packet travels from one host to another on different networks, including the roles of ARP, switching, routing tables, and protocols like ICMP and IP. It uses diagrams and examples to illustrate routing concepts.
This document provides an overview of routing technologies and IP routing. It begins by defining the objectives of covering IP routing, routing versus routed protocols, static versus dynamic routing, advantages and disadvantages of each, interfaces versus lines, and setting up a simple network. It then introduces IP routing as the process of moving packets between networks using routers and their routing tables. The document explains static and dynamic routing methods, routing and routed protocols, and provides examples of configuring a basic network with two routers and PCs using Cisco Packet Tracer's command line interface.
This document provides an overview of dynamic routing protocols and configuration of RIPv2. It discusses the purpose of dynamic routing protocols in discovering remote networks, maintaining up-to-date routing information, and choosing the best path. RIPv2 configuration topics include enabling RIP, advertising networks, verifying RIP operation, and propagating a default route. The document also examines the components of routing table entries, such as route source, metric, and next hop. It describes the hierarchy of dynamically learned routes including ultimate, level 1, parent and child routes.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
The document discusses the OSI network layer and IP networking concepts. It covers the basic functions of the network layer including addressing, encapsulation, routing, and decapsulation to enable communication between hosts. The key network layer protocol, IP, is examined in detail including its connectionless and best-effort design. The document also discusses how networks are logically separated to group hosts for improved performance, security, and address management.
The document discusses the functions of the transport layer in the OSI model. It explains that the transport layer accepts data from the session layer, breaks it into packets and delivers them to the network layer. It is responsible for guaranteeing successful arrival of data at the destination and provides end-to-end communication between source and destination transport layers. The transport layer separates upper layers from low-level data transmission details and handles any data loss or damage. It can transmit packets in the same order or as isolated messages depending on the network and protocol.
This document describes a custom network protocol designed to improve throughput performance compared to traditional TCP/IP protocols. The custom protocol uses a simplified 8-byte header containing only essential fields like source/destination addresses and port numbers, and sequence number. Tests of the custom protocol transferring a 10MB file between nodes achieved throughputs up to 902kbps, significantly higher than when using smaller packet sizes. By removing unnecessary TCP/IP header fields and processing, the custom protocol reduces overhead and improves throughput.
Exterior Routing Protocols And Multi casting Chapter 16daniel ayalew
This document discusses exterior routing protocols and multicasting. It begins by explaining the limitations of distance-vector and link-state routing protocols for exterior routing between autonomous systems. It then describes path vector routing and the Border Gateway Protocol (BGP) which allows routers in different autonomous systems to exchange routing information. The document provides details on BGP neighbor acquisition, reachability, and network reachability procedures. It also discusses multicast addressing, protocols like IGMP for host group management, and multicast routing protocols like PIM that establish distribution trees independent of unicast routing.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
IRJET- Constructing Inter Domain Packet Filter for Controlling IP SpoofingIRJET Journal
This document proposes an Inter Domain Packet Filter (IDPF) architecture to reduce IP spoofing on the internet. The IDPF architecture takes advantage of the limited number of feasible paths between autonomous systems (ASes) implied by their commercial relationships. It constructs packet filters based on routing information exchanged in Border Gateway Protocol (BGP) updates between neighboring ASes, without requiring global routing knowledge. Simulation studies show that even partial deployment of IDPFs can help localize the source of attack packets and limit attackers' ability to spoof IP addresses.
This chapter covers Spanning Tree Protocol (STP) fundamentals, including how STP elects a root bridge, identifies root, designated and blocking ports, and prevents forwarding loops. It also examines STP port states and types, as well as how STP converges when links fail through the use of topology change notifications.
Routing of netwok protocls and how .pptxsayidkhalif
This document provides an overview of routing and routers. It discusses what a router is and its main functions, including joining multiple networks, assigning IP addresses, and selecting the best path. The document describes how routers work by examining packet headers to make routing decisions using routing tables. It also covers the various ports found on routers and the different types of memory.
The network layer is responsible for carrying packets between hosts and routing packets through routers and switches. It addresses each device with an IP address to allow global communication. Routing protocols like RIP, OSPF, and BGP are used for routing packets within and between autonomous systems. Multicast routing protocols deliver data from one source to multiple destinations, while flooding can be used for broadcast routing but wastes bandwidth. The network layer packetizes data, fragments packets if needed for transmission through different networks, and performs address resolution.
The document discusses wireless local area networks (WLANs) and their components and operation. It covers topics such as 802.11 wireless standards, WLAN infrastructure components including access points and antennas, WLAN topology modes including infrastructure and ad hoc, the basic service set (BSS) and extended service set (ESS), WLAN frame structure, and CSMA/CA wireless medium access. It also describes CAPWAP protocol which enables a wireless LAN controller to manage multiple access points, the split MAC architecture, and FlexConnect access points which can operate in standalone mode over a WAN link. Finally, it discusses channel management techniques for WLANs such as using non-overlapping channels to avoid interference between access points.
This document provides release notes for firmware version 1.3.4 of the DrayTek VigorAP 902 access point for the UK/Ireland market. The update includes improvements to resolve some security vulnerabilities and fix issues with changing SSIDs and logout functionality. No new features were added in this release. Users are recommended to upgrade to benefit from these improvements and fixes.
The document discusses various methods for maintaining cloud systems, including patching cloud components, designing and implementing automation/orchestration, and different patching strategies. It covers patching development, QA, and production environments separately and describes techniques like rolling updates and blue/green deployments. The document also discusses hotfixes, patching failover clusters, dependency considerations, and guidelines for reviewing component types, using test environments, scheduling updates, and investigating dependencies. It suggests automating tasks like snapshotting VMs, patching, restarting VMs, and removing outdated/stale components. Automation workflows and regular maintenance schedules are also proposed.
The document discusses designing secure and compliant cloud infrastructures. It covers topics like determining organizational compliance needs, responsible parties in cloud environments, developing security policies, questions to ask when developing policies, goals of securing cloud solutions, applying a holistic security approach, guidelines for planning a secure cloud infrastructure, and the need for compliance in cloud design.
Virtual networks allow isolation of cloud resources and connectivity between resources. Key components for virtual networks include virtual switches, bridges, and network interface cards. Security measures involve techniques like network segmentation, firewalls, and encryption to restrict access and monitor traffic. Proper design of virtual networks with these techniques helps create a secure cloud environment.
The document discusses various security issues that may occur and steps to troubleshoot them. It covers issues related to identity and access such as authentication, authorization, federation and single sign-on. It also discusses how to troubleshoot attacks including external attacks, internal attacks, and privilege escalation. Additional security issues covered include unencrypted communication, unauthorized physical access, unencrypted data, weak security technologies, insufficient security controls and processes, tunneling/encryption issues, and security device failures. Guidelines are provided for troubleshooting each type of issue.
The Indian government has been working over the past few years to include elements of ITS in the transport sector. This standard ensures the optimal operation of the current transport infrastructure. It also increases the efficiency, safety, comfort, and quality of the system. That is why the government created the AIS-140 standard. Compliance with this standard means all vehicles used for public transit must have panic buttons and vehicle tracking modules installed. Nevertheless, in future in the standard protocol of AIS-140 you can expect fare collection and CCTV capabilities.
Get more information here: https://blog.watsoo.com/2023/12/27/all-about-prithvi-ais-140-gps-vehicle-tracker/
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRPeter Gallagher
In this session delivered at NDC Oslo 2024, I talk about how you can control a 3D printed Robot Arm with a Raspberry Pi, .NET 8, Blazor and SignalR.
I also show how you can use a Unity app on an Meta Quest 3 to control the arm VR too.
You can find the GitHub repo and workshop instructions here;
https://bit.ly/dotnetrobotgithub